Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security operations center (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/162)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
155
1.
Maritime Security Operations Center (M-SOC)
2.
security operations center
3.
maritime cyber security operations centers
4.
Municipal Operations Center
5.
security operation center
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyber operations
12.
cyber operations exercises
13.
cyberspace operations planning
14.
Defensive Cyber Operations
15.
digital operations
16.
energy consumption of construction operations
17.
ferry operations
18.
influence operations
19.
NATO cyber operations definitions
20.
Offensive Cyber Operations
21.
operations research
22.
Port Operations
23.
port operations efficiency
24.
predictive analytics in port operations
25.
psychological operations
26.
supply chain operations reference (SCOR)
27.
supply chain operations reference (SCOR) model
28.
Sweedler operations
29.
term operations
30.
autoservice center
31.
center-tapped coupled inductor
32.
data center
33.
data center (DC)
34.
data center applications
35.
daycare center
36.
Non-emergency Contact Center
37.
shared service center
38.
shared service center (SSC)
39.
underwater data center
40.
urban learning center
41.
ad-hoc sensor networks security
42.
Automatic Security Verification
43.
Blockchain security
44.
cache security
45.
communication system security
46.
comprehensive system of economic security
47.
computer security
48.
cooperative security dilemma
49.
cyber security
50.
cyber security education
51.
cyber security exercises
52.
cyber security monitoring
53.
cyber security strategies
54.
cyber-security
55.
data and information security
56.
data security
57.
development of security cameras
58.
digital security practices
59.
drinking water security
60.
economic security
61.
economic security of enterprise
62.
emotional security
63.
energy security
64.
energy security indicator
65.
Estonian information security standard
66.
graded security
67.
hardware security
68.
hardware security primitive
69.
high level of security
70.
Homeland security
71.
human security
72.
information security
73.
information security and privacy
74.
initial level of security
75.
internal security
76.
international security
77.
investment and innovation security
78.
IPv6 security
79.
IT security
80.
IT security management
81.
job security
82.
long-term security
83.
maritime cyber security
84.
medium level of security
85.
metadata model for security measures
86.
Middle Eastern security
87.
Mobile security
88.
national cyber security strategy
89.
national security
90.
NATO. Science for Peace and Security Program
91.
network security
92.
network security monitoring
93.
OSCE (Organization for Security and Co-operation in Europe)
94.
passenger’s security
95.
policy-based routing security
96.
political and security cultures
97.
post-quantum security
98.
power system security
99.
quantitative security
100.
regional security
101.
RISC-V Security Verification
102.
Safety and Security in Sea Transportation
103.
safety and security testing
104.
security
105.
security adaptation
106.
security alert prioritization
107.
security analysis
108.
security and justice (AFSJ)
109.
Security and political science
110.
security and privacy
111.
security and privacy in smart grids
112.
Security Assertion Mining
113.
security closure
114.
Security Coverage
115.
security dataset
116.
security dilemma
117.
Security evaluation
118.
security evaluation instruments
119.
Security limitations
120.
security log analysis
121.
security management
122.
security model
123.
security monitoring
124.
security notion
125.
security objectives
126.
security of data
127.
security of supply
128.
security patterns
129.
security policy
130.
security problem definition
131.
security proof
132.
security protocols
133.
security requirements
134.
security requirements engineering
135.
security risk assessment
136.
security risk management
137.
security risks
138.
security science and technology
139.
security strategies
140.
security systems for military objects
141.
security testing
142.
security training
143.
security verification
144.
security-by-design
145.
social security planning
146.
societal security
147.
software security
148.
software security level
149.
software security subcharacteristics
150.
sufficient level of security
151.
system of economic security
152.
system security
153.
terrorism security
154.
transmission System Security
155.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT